All Posts Tagged: masquerading

7 ways to spruce up your cybersecurity practices

David Pollino
Security

It’s not surprising that cyberattacks may be among the greatest threats to companies in 2018. Last year, we saw a large number of high-profile cyberattacks including Equifax, Uber and the now infamous WannaCry ransomware attack. Regardless of size or sector, all organizations may be vulnerable.

Mature, spry businessman sitting and working on the laptop that's in his lap.A new report, “Cyber Readiness” by insurance and underwriting firm Hiscox, has found 73% of organizations have major shortcomings in their readiness to protect against cyberattacks. To protect your business, here are seven ways you can “spring clean” your businesses’ cybersecurity:

1. Safeguard your intellectual property. Intellectual property is vital to many businesses. Product blueprints and trade secrets are essentially the lifeblood of the company. Screen employees and vendors, as well as securing networks, computers and equipment against intrusion from malware and spyware, malicious software that can disrupt devices and networks or capture confidential data and send it to hackers.

2. Patch your systems. Install anti-virus protection on every computer and device on your network.

3. Educate your workforce. Teach your employees to recognize, avoid and report suspicious emails containing attachments or hyperlinks, common signs of phishing, in which hackers use electronic channels to steal sensitive information.

4. Update your data policies. Ensure your software and operating systems are current.

5. Scan for vulnerabilities. To ensure no unauthorized code has been introduced to your company’s network, run a vulnerability scan against approved applications. If any software is vulnerable, you should get your IT department to update and patch immediately.

6. Maintain a separate administrator account. Using an administrator account with a unique password so that if an IT administrator’s primary email or passwords are compromised, hackers will still not have administrative rights to gain control of servers and networks.

7. Create a response place. Develop a plan for responding to cyberattacks. If your business becomes the target of a cyberattack involving unauthorized financial transactions, for example, promptly contact your financial institution and notify federal law enforcement of the incident. Implement verification processes as an extra layer of security for approving outgoing funds transfers or for changes to vendor payment instructions.

Companies can help mitigate common cybersecurity threats by adopting simple measures that can go a long way to protect your organization.

Read More ›

Business scam poses threat for real estate transactions

David Pollino
Security
view from above as older couple looks at a laptop together while going through financial paperwork.

It’s a new twist in the scam known as business email compromise, or masquerading, that I have been blogging about for a few years.

Read More ›

Preventing insider threats: Actions to help protect your business

David Pollino
Security
Sixtysomething man on the phone while peering through blinds out the window, observing something suspicious outside the window.

These processes only take a few minutes for all parties involved, but they promote the best outcome: Keeping the honest employee honest.

Read More ›

Masquerading fraud losses top $3 billion

David Pollino
Security
Close up on female worker

Masquerading fraud (also known as “business email compromise” or BEC fraud, for short) is a type of payment fraud that involves the compromise of legitimate business email accounts.

Read More ›

Masquerading caution: Always double-check payment instructions

David Pollino
Security
Male phone caller in a tie, but his face is not visible.

I can’t emphasize enough just how prevalent this threat is, with losses estimated at over $1 billion last year.

Read More ›